Sciweavers

360 search results - page 27 / 72
» Detecting Intrusions Specified in a Software Specification L...
Sort
View
EMSOFT
2005
Springer
14 years 1 months ago
HAIL: a language for easy and correct device access
It is difficult to write device drivers. One factor is that writing low-level code for accessing devices and manipulating their registers is tedious and error-prone. For many syst...
Jun Sun 0002, Wanghong Yuan, Mahesh Kallahalla, Na...
CICLING
2009
Springer
14 years 8 months ago
Generating Executable Scenarios from Natural Language
Abstract. Bridging the gap between the specification of software requirements and actual execution of the behavior of the specified system has been the target of much research in r...
Michal Gordon, David Harel
COMSWARE
2006
IEEE
14 years 2 months ago
Comparing lexical analysis tools for buffer overflow detection in network software
Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Davide Pozza, Riccardo Sisto, Luca Durante, Adrian...
UML
1999
Springer
14 years 5 days ago
Enabling the Refinement of a Software Architecture into a Design
Software architecture research has thus far mainly addressed formal specification and analysis of coarse-grained software models. The formality of architectural descriptions, their...
Marwan Abi-Antoun, Nenad Medvidovic
ICFEM
2000
Springer
13 years 11 months ago
Formal Treatment of a Family of Fixed-Point Problems on Graphs by CafeOBJ
A family of well known problems on graphs includingthe shortest path problem and the data flow analysis problem can be uniformly formulated as a fixed-point problem on graphs. We ...
Tetsuo Tamai